By Light Professional IT Services

Returning Candidate?

Cyber Intel Analyst (TS/SCI)

Cyber Intel Analyst (TS/SCI)

ID 
2018-2206
# of Openings 
1
Job Locations 
US-MD-Fort Meade
Posted Date 
1/24/2018
Category 
Information Technology
Clearance 
TS/SCI

More information about this job

Overview

By Light is hiring a Cyber Intel Analyst to join our team supporting the Joint Forces Headquarters-Department of Defense Information Network (JFHQ-DODIN), in the J22. The Cyber Intel Analyst will produce and disseminate all-source integrated intelligence analysis to support DODIN and defensive cyberspace operations (DODIN/DCO) planning, integration, coordination, and execution. This position will work the normal daytime shift.

 

By Light is an IT products and services firm specializing in software development, satellite/terrestrial communications, cyber security, and network engineering/design. Headquartered in Arlington, VA, we provide support worldwide to DOD, Federal Civilian, and Health IT customers.

Responsibilities

  • Assist in analyzing ongoing threat related activities and information targeting the DODIN and develop Joint Intelligence Preparation of the Operational Environment (JIPOE).
  • Make recommendations for JFHQ-DODIN action to protect the DODIN.
  • Provide all-source analytical support to DODIN/DCO to include production of cyber related Intelligence Estimates.
  • Produce special reports and assessments related to specific incidents and trends concerning threats to the DODIN as required.
  • Conduct analysis to identify indications of adversary activity and warn (Indications and Warning) leaders of potential threats, cyber developments, events or conditions that may adversely affect the DODIN; advising leaders in order to proactively confront emerging challenges, leverage opportunities, avoid surprise and produce strategic outcomes favorable to the U.S. or allied interests.
  • Respond to the J2 for threat identification of activity directed against DoD systems.
  • Evaluate international events, all-source and open-source intelligence, and operational information to assist in the assessment of potential impacts to the DODIN and alert the JFHQ-DODIN Staff and Leadership to potential network exploitation or attacks. Using these techniques and taking advantage of web-based research tools, match potential threat candidates with identified activity, produce reports and/or briefs, and make intelligence-derived recommendations to the J2/J3 for the defense of the affected network.
  • Develop and present in-depth intelligence briefings and presentations concerning nation-state and non-state actor capabilities and activities, specific actor profiles, and incidents affecting DoD communications networks.
  • Assist the J2 in the management of daily intelligence reports and bulletins and web sites on the classified networks.
  • Maintain communications as directed by the J2, with intelligence representatives at JFHQ-DODIN, Service components, other Combatant Commands, Department of Homeland Security, National Infrastructure Protection Center (NIPC), Intelligence Community, Joint Staff J2/JCS, DODIN service providers, and other organizations as designated.

Required Experience/Qualifications

  • Clearance: DoD TS/SCI and eligible for C/I Polygraph.
  • BA/BS degree in Information Technology or Information Security, Computer Science, Intelligence Analysis, Cyber Security, or another related field of study or equivalent 5+ years performing cyber threat intelligence analysis.
  • Intelligence all-source analysis; Defense Intelligence Analysis Program; intelligence writing and briefing at a senior level is a must.
  • Ability to place threats in the proper context and identify the “so what” for decision makers; ability to communicate technical information to non-technical audiences.
  • Ability to apply formal intelligence analysis methods, develop hypothesis, prove/disprove relationships, always ask “why”, defend your analysis, and apply attribution to cyber threat activity.
  • Technical understanding in the following areas: network communication using TCP/IP protocols, basic system administration, basic understanding of malware (malware communication, installation, malware types), intermediate knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, open source information collection.
  • Strong understanding of the Intelligence Cycle.
  • Ability to write detailed and comprehensive cyber intelligence analytical products in a team environment.
  • Self-starter with the ability to engage with cyber intelligence analyst counterparts across the US Intelligence and cyber communities; lead and participate in working groups, conferences, etc.
  • Demonstrated application of intelligence analysis and tradecraft through writing and presentation ability. Writing samples may be required.
  • Ability to present analysis to large groups on a regular basis.
  • Demonstrated expertise using various intelligence and cyber GOTS/COTS analytical tools: Analyst Notebook, Palantir, TAC, M3, HOTR, Sharkseer, SIEM, Pulse, iSpace, etc.
  • Demonstrated ability and flexibility to support planning and execution of military exercises involving cyber defense training objectives (Occasional surge/weekend hours and travel may be required).
  • Strong working ability with all MS Office applications (Word, PowerPoint, Excel, Project, etc.).

 

An Equal Opportunity Employer/Protected Veterans/Individuals with Disabilities

#CJ